New Portal Helps Devs Spot Malicious Open Source Packages

New Portal Helps Devs Spot Malicious Open Source Packages

Spotting compromises hidden deep in open source- or commercial supply chains is difficult under the best of circumstances. For developers and development teams tasked with achieving aggressive development and release goals — an environment in which software security and integrity are low priorities — the job is even harder. That’s ... Read More
Learning with ReversingLabs: Identifying File Content with YARA Rules Whiteboard

Level up your YARA game

YARA is an important piece in the defender's chess set. Depending on how you play the game, you can think of YARA as either a bishop or a rook — a powerful weapon in the hands of a threat hunter or a layer that makes the defender's wall a bigger ... Read More
White House memo lays down the law on software supply chain security

White House memo lays down the law on software supply chain security

The new memorandum calls on firms selling software to the federal government to attest to its conformity with NIST security standards. Here's what you need to know ... Read More
Machine Learning for Humans

Machine Learning for Humans

Machine learning is a cutting-edge predictive threat detection technology. These math-powered classification systems take in object properties, called features, and find correlations between them to proactively detect novel pieces of malware. While the introduction of machine learning technologies represents a significant leap forward for threat detection capabilities, it did very ... Read More
Learning with ReversingLabs: Identifying File Content with YARA Rules Whiteboard

Level up your YARA game

YARA is an important piece in the defenders chess set. Depending on how you play the game you can think of YARA as either a bishop or a rook. Powerful weapon in the hands of a threat hunter, or a layer that makes the defenders wall a bigger obstacle to ... Read More